Posted: August 23rd, 2022

Analysis of Cryptography

Analysis of Cryptography
Because of growth within your organization, information and policies are in many locations and often poorly maintained. Your company has decided to start a knowledge base for each department that can be accessed by any employee on the company’s intranet. Your manager is aware of your success at the career fair and security presentation at the high school and has selected you to author the first article from your department on cryptography, encryption, and cryptanalysis.

Write 2- to 3-page knowledge base article for your company’s intranet about encryption and cryptanalysis basics.

Define cryptography, cryptanalysis, and cryptology.

Explain the role and importance of cryptography for your company’s cybersecurity.

Summarize threats to the company from cryptanalysis.

Identify at least 5 specific tools or techniques used in cryptography. Briefly explain each tool or technique you selected, including information like its attributes and the solution it provides.

Analysis of Cryptography
With the organization’s rapid growth, information management has become more imperative. Thus, the need for a company’s intranet to provide a secured chancel whereby different employees collaborate, communicate, and manage related organizational tasks easily. Therefore, to achieve a smooth flow of functions, adopting the cryptographic system is imperative. According to statistics, more than 80% of organizations encrypt their web traffic as they seek to protect sensitive data while meeting imposed security and privacy regulations. Cryptography has become an essential tool in achieving this protection (Hodgson, 2019). This paper analyses cryptography, its cybersecurity roles, and tools and techniques used in cryptography.
Cryptography entails the methods, means, or principles used for information transfers by adopting algorithms to hide semantic content and prevent unauthorized malicious use. It converts an input, for essence, message in plaintext to ciphertext, an encrypted output using an algorithm and key. Cryptography provides an integrated layer of diffuse for an origination that enhance the protection of communications and transactions, enhance the confidentiality of data its integrity, and prevent potential tampering of information either storage or transit., thus this is an imperative infrastructure; thus, the company needs to adopt cryptographical solutions to secure sensitive data (Wang, 2020).
Cryptanalysis entails the process of analyzing and identifying weak spots of cryptography algorithms. It often offers breaches of these systems allowing for the decryption of encrypted messages even with the absence of the cryptographic keys. It is often used by attackers that seek to gain access to protected information and data. This process is a potential security threat for an organization.
On the other hand, Cryptology entails the science of secretive form of storage of data and communication. It is the interaction of cryptography and cryptanalysis to ensure only legitimate users can access the secretly stored data.
Roles and importance of cryptography for the company’s cybersecurity
Cybersecurity is one of the leading organizational priorities, a breach of this can lead to severe consequences that will cause detrimental effects financially and reputation-wise. Herein are the security-related roles of cryptography with regards to the company’s cybersecurity;
Identification and authentication
Cryptography ensures that before any information transfer is initiated, the sender’s and receivers’ identities should be verified and authenticated to prevent the erroneous transfer of information to the unintended recipient that will jeopardize the integrity of the information. In these cases, message authentication codes and digital signatures come are used to prove the identity and authenticity of the sender and recipient.
Adopting cryptography ensures in-depth verification and authentication from the recipient to ensure that the message transferred is not altered during storage or transit. The organization comprises different departments with totally different functions; thus, the information transfer process should protect the integrity of the information to prevent alterations that could lead to subsequent consequences. Cryptography uses hashing algorithms that provide specific codes that protect information and data transit, so it gets to the intended receiver unaltered (Hodgson, 2019).
There is an increase in information transferred between employees in such an organization as ours. With the recent growth, information is often transferred with little or no accountability. Cryptography is essential for no repudiation to ensure that the senders and recipients of the information are held accountable. Cryptograph uses digital signatures to label the source of information and prevent senders’ denial of the information. Notably, it ensures that both senders and receivers are accountable for information transfer, preventing anonymity (Hodgson, 2019).
Confidentiality of information, especially in such a large organization, is paramount. The potential breach of information confidentiality can jeopardize the organization’s reputation as it handles employees’ personally identifiable information and the client’s classified information. A cryptographic algorithm is used to achieve confidentiality and prevent possible authorized access. The information is coded where only the sender and recipient have the keys to decrypt the information. This ensures that information confidentiality is protected in all lifecycles (Boonkrong, 2021).
Threats from cryptanalysis to the company
Cryptanalysis entails the process of identifying weak spots in cryptographic algorithms and subsequently using them to decipher the protected ciphertext (Chakrabarti, 2021). These processes possess a security threat and a potential source of a security breach where attackers deduce the weakness from the algorithm rather than its applications. In turn, uses this weakness to find the secret key by conducting a total break where the attacker finds the secret key, or global deduction where he decrypts the information without the secret distinguishing the ciphertexts from the encryption, potentially accessing unauthorized information.
Tools and techniques used in cryptography
Cybersecurity professionals use cryptography tools to fortify the organization’s computer defense system. Herein are five cryptography tools and techniques;
Security tokens -A security tokens are a device that contains individual information and is often used during authentication. For essence, for one to access a company’s network service, they plug in the security tokens system that allows them to gain access, thus preventing unauthorized access to classified information and data.
Java Cryptography Architecture (JCA) -The java crypto Architecture employs java programming language with inbuilt cryptographic functions integrated with the application programming interface. The JCA uses the programming interface to validate employees using encrypted and managing keys. These generate random numbers that are specific to an individual that is used for validation.
Sign tool is another cryptography tool embedded in the Microsoft operating system to verify signatures and digitally sign documents. Adopting this security tool ensures that the documents are not tampered with in storage or transit within the company.
Key-based authentication is another cryptography tool that uses asymmetric algorithms rather than passwords to authenticate a person’s identity. This is a safer form of authentication as it requires the system to decrypt
Docker is another essential tool in cryptographic systems whereby information stored in this tool is encrypted and thus cannot be accessed unless a person has an access key. This prevents authorized access to information or potential adversities (Wang, 2020).
Using this cryptography tool is a step closer to combating cyber security threats by ensuring safe transit and storage of information.

Boonkrong, S. (2021). Authentication and Access Control: Practical Cryptography Methods and Tools. Apress.
Chakrabarti, S., & Babu, G. S. (2021). Security Threat Detection and Cryptanalysis of Dynamic and Random S Box Based Two-Fish Algorithm. International Journal, 10(2).
Hodgson, R. (2019). Solving the security challenges of IoT with public-key cryptography. Network Security, 2019(1), 17-19.
Wang, S., Rohde, M., & Ali, A. (2020, January). Quantum cryptography and simulation: Tools and techniques. In Proceedings of the 2020 4th International Conference on Cryptography, Security, and Privacy (pp. 36-41).


Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Why choose us

You Want Best Quality and That’s our Focus

Top Essay Writers

We carefully choose the most exceptional writers to become part of our team, each with specialized knowledge in particular subject areas and a background in academic writing.

Affordable Prices

Our priority is to provide you with the most talented writers at an affordable cost. We are proud to offer the lowest possible pricing without compromising the quality of our services. Our costs are fair and competitive in comparison to other writing services in the industry.

100% Plagiarism-Free

The service guarantees that all our products are 100% original and plagiarism-free. To ensure this, we thoroughly scan every final draft using advanced plagiarism detection software before releasing it to be delivered to our valued customers. You can trust us to provide you with authentic and high-quality content.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.